CSET Policy Brief

Total Page:16

File Type:pdf, Size:1020Kb

CSET Policy Brief OCTOBER 2020 Designing Alternatives to China’s Repressive Surveillance State CSET Policy Brief AUTHOR Dahlia Peterson Executive Summary Since the 1950s, China has built a formidable surveillance state increasingly reliant on artificial intelligence (AI) technologies. The COVID-19 pandemic has provided China an opportunity to soften the reputation of its surveillance technologies, which include tracking apps, surveillance by drones, cameras inside and outside houses, remote temperature scanning, and upgraded facial recognition to identify mask wearers. These technologies have now been legitimized for public health purposes. COVID-19 may accelerate China's domestic surveillance efforts and lead to investments creating capabilities preserved post-COVID. Globally, China's surveillance model may gain even more legitimacy as a vital tool beyond the pandemic, further deepening normative advantages for China by allowing the strategic expansion of Chinese surveillance companies worldwide. Since 2008, at least 80 countries have adopted Chinese surveillance technology platforms. These platforms are more than just security cameras: they integrate multiple government databases and provide analytic capabilities that can support multiple command and control centers. If democratic governments do not successfully demonstrate how to protect public health and human rights, they risk losing the mantle of global leadership in the 21st century. The United States must therefore better understand China’s surveillance infrastructure and why it appeals to adopting countries, using this knowledge to advance an alternate vision with its democratic allies. China employs surveillance to repress broad swaths of its population—most notably the Uyghurs in Xinjiang and nationwide—and enables other countries to execute their own surveillance systems through export of its technologies. However, several nationwide surveillance programs have escaped sustained attention. This paper will detail how these programs work and how they have enabled the deployment of current COVID-19 surveillance techniques. The United States and its allies can meet these challenges in several ways. First, the United States must reduce domestic human rights harms and racial injustice by its own companies and institutions. Second, the State Department’s Bureau of Democracy, Human Rights and Labor (DRL) can host Track 1.5 dialogues modeled off State’s Civil Society 2.0 and the Open Government Partnership to engage democratic government and non- government stakeholders in Europe, Asia, and beyond. These dialogues can Center for Security and Emerging Technology | 2 identify areas and companies engendering the greatest human rights harms from surveillance, compare and obtain best practices from existing privacy and surveillance legislation, and coordinate with the European approach to surveillance export controls—which aims to restrict surveillance technology exports on normative and non-military human rights grounds. On the technical level, national research funding organizations such as the National Science Foundation (NSF) and the Defense Advanced Research Projects Agency should support research on privacy-preserving facial recognition systems. Bodies such as the National Institute of Standards and Technology should also expand prior research on error mitigation in facial recognition. U.S. representatives should actively engage the Global Partnership on AI’s technical expertise to propose alternate facial recognition standards to Chinese companies’ submissions at the United Nations’ International Telecommunications Union. Center for Security and Emerging Technology | 3 Table of Contents Executive Summary ............................................................................................... 2 The Rise of China’s Surveillance State ................................................................ 5 The Golden Shield Project(金盾工程) ......................................................... 6 Safe Cities(平安城市)and Skynet(天网工程) .......................................... 6 Sharp Eyes(雪亮工程) .................................................................................. 7 Predictive Policing ............................................................................................ 8 Police Cloud (警务云) ............................................................................... 9 Xinjiang’s Integrated Joint Operations Platform. (一体化联合作战平台) ........................................................................... 9 China’s COVID-19 Surveillance Toolkit ........................................................... 10 Location Tracking ........................................................................................... 10 Upgraded Video Surveillance ....................................................................... 11 Key Concerns ................................................................................................. 11 How U.S. and Chinese Surveillance Approaches Broadly Differ ................... 13 Policy and Messaging Recommendations ........................................................ 14 Strengthen an Allied Approach .................................................................... 15 Identify Actors and Apply Export Controls ................................................... 16 Promote Technological Best Practices and Codify Reform ......................... 17 Acknowledgments .............................................................................................. 18 Endnotes .............................................................................................................. 19 Center for Security and Emerging Technology | 4 The Rise of China’s Surveillance State Since the advent of the People’s Republic in 1949, China has honed its surveillance state to guarantee sociopolitical control. Tools deployed relied heavily, if not exclusively, on manual methods, including through danwei employment units, the hukou residency registration system, and dang’an secret political files.1 As China began to reform and open up in 1979, traditional methods lost much of their effectiveness.2 Not least, the 1989 pro- democracy protests and the following bloody crackdown, along with the domestic rise of the internet, led the Party-state leadership to tighten surveillance over an increasingly mobile and vocal citizenry. Starting in the early 1990s, technological methods began replacing many manual tools, giving rise to the modern surveillance state. China’s surveillance state combines automated and manual approaches. Officials maintain national DNA databases and extensive video surveillance networks of public and residential spaces, as well as monitor and censor internet and phone communications—enforcing de-anonymization through real-name registration requirements.3 AI is increasingly used for facial recognition, identifying persons and patterns of interest through predictive policing, and automating content moderation.4 Yet despite the government’s vision of big data seamlessly updating dossiers in real time, implementation has been hindered by human inefficiency, unreliable and incomplete basic data, and incompatible datasets or systems.5 These capabilities are often deployed as “programs” that integrate multiple databases and support command and control centers with analytic capabilities.6 Since 2003, the Chinese government has deployed several major national- level surveillance programs, overlapping with and in some cases advancing their predecessors’ goals and physical infrastructure. This paper focuses on these programs due to the availability of open source information, their nationwide reach, or the possibility that their currently localized approaches may expand across China. It is worth noting up front that the scope of these programs and their relationships to one another are frequently unclear, and there is no reliable local or nationwide breakdown of the number of facial recognition-equipped cameras.7 There are also no independently verified figures for private versus publicly owned cameras, and whether these cameras feed both local and national surveillance systems. The same uncertainty applies to the number of Center for Security and Emerging Technology | 5 cameras dedicated to commercial applications—such as paying at retail stores by entering the phone number linked to your government-issued ID and verifying your face—versus public security applications.8 China’s major surveillance programs are examined further in the following sections. The Golden Shield Project(金盾工程) The Ministry of Public Security (MPS) launched the Golden Shield Project in the early 2000s to meet the Party-state’s growing demand for greater social control over the entire population—especially political dissidents. The project incorporates technologies now central to China’s surveillance apparatus, such as internet censorship and facial and voice recognition.9 It was initially rolled out in two main phases: first through population databases, ID tracking systems, and internet surveillance tools, then through surveillance camera systems.10 According to state-run media, between 2003 and 2006, the MPS logged personal information for 96 percent (or 1.2 out of 1.3 billion) of China’s citizens.11 Facial and voice recognition technologies are key to China’s surveillance development, as examined in the following sections. Safe Cities(平安城市)and Skynet(天网工程) China achieved greater social control through Safe Cities and Skynet, two similar programs that work in tandem and are
Recommended publications
  • Internet Surveillance in China
    The Architecture of Control: Internet Su rveillance in China James A. Lewis , Center for Strategic and International Studies July 200 6 Security concerns shape China’s official internet and information technology strateg ies . Th ese include concerns shared by many cou nt ries: promoting a strong and growing economy , providing information assurance , and defending against foreign intrusions into China’s information space . Most importantly for the Chinese, information security include s a political element not foun d in many other nations – c ontrol by the party and the state over communications and the flow of informa tion . The rapid spread of internet access and mobile communications pose a serious challenge to this goal. In response, China’s security apparatus is reorienting its informational defenses. In the past, the emphasi s was on blocking access - the “great firewall.” In the future, the emphasis will be on the monitoring and surveillance of online activities. China’s primary objective in internet securi ty is political – preventing IT from eroding the regime’s authority. Information security is defined in China as “a comprehensive concept understood in a broad sense, and it involves political, economic, cultural, ideological, media, social and military l evel or field. ” It includes “data, system, network, infrastructure .”1 Chin ese officials worry about the potential of the Internet to contribute to the loss of state secrets , offer new avenues for organizing dissent and opposition , and spread “harmful inf ormation. ” This makes controlling access to "harmful network information” and the ability to monitor and intercept communications top priorities .2 For China’s leadership, one particular set of event s demonstrated the risks of not securing networks.
    [Show full text]
  • Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online
    Trapped in a Virtual Cage: Chinese State Repression of Uyghurs Online Table of Contents I. Executive Summary..................................................................................................................... 2 II. Methodology .............................................................................................................................. 5 III. Background............................................................................................................................... 6 IV. Legislation .............................................................................................................................. 17 V. Ten Month Shutdown............................................................................................................... 33 VI. Detentions............................................................................................................................... 44 VII. Online Freedom for Uyghurs Before and After the Shutdown ............................................ 61 VIII. Recommendations................................................................................................................ 84 IX. Acknowledgements................................................................................................................. 88 Cover image: Composite of 9 Uyghurs imprisoned for their online activity assembled by the Uyghur Human Rights Project. Image credits: Top left: Memetjan Abdullah, courtesy of Radio Free Asia Top center: Mehbube Ablesh, courtesy of
    [Show full text]
  • China's Global Media Footprint
    February 2021 SHARP POWER AND DEMOCRATIC RESILIENCE SERIES China’s Global Media Footprint Democratic Responses to Expanding Authoritarian Influence by Sarah Cook ABOUT THE SHARP POWER AND DEMOCRATIC RESILIENCE SERIES As globalization deepens integration between democracies and autocracies, the compromising effects of sharp power—which impairs free expression, neutralizes independent institutions, and distorts the political environment—have grown apparent across crucial sectors of open societies. The Sharp Power and Democratic Resilience series is an effort to systematically analyze the ways in which leading authoritarian regimes seek to manipulate the political landscape and censor independent expression within democratic settings, and to highlight potential civil society responses. This initiative examines emerging issues in four crucial arenas relating to the integrity and vibrancy of democratic systems: • Challenges to free expression and the integrity of the media and information space • Threats to intellectual inquiry • Contestation over the principles that govern technology • Leverage of state-driven capital for political and often corrosive purposes The present era of authoritarian resurgence is taking place during a protracted global democratic downturn that has degraded the confidence of democracies. The leading authoritarians are ABOUT THE AUTHOR challenging democracy at the level of ideas, principles, and Sarah Cook is research director for China, Hong Kong, and standards, but only one side seems to be seriously competing Taiwan at Freedom House. She directs the China Media in the contest. Bulletin, a monthly digest in English and Chinese providing news and analysis on media freedom developments related Global interdependence has presented complications distinct to China. Cook is the author of several Asian country from those of the Cold War era, which did not afford authoritarian reports for Freedom House’s annual publications, as regimes so many opportunities for action within democracies.
    [Show full text]
  • New Media in New China
    NEW MEDIA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIZING EFFECT OF THE INTERNET __________________ A University Thesis Presented to the Faculty of California State University, East Bay __________________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Communication __________________ By Chaoya Sun June 2013 Copyright © 2013 by Chaoya Sun ii NEW MEOlA IN NEW CHINA: AN ANALYSIS OF THE DEMOCRATIlING EFFECT OF THE INTERNET By Chaoya Sun III Table of Contents INTRODUCTION ............................................................................................................. 1 PART 1 NEW MEDIA PROMOTE DEMOCRACY ................................................... 9 INTRODUCTION ........................................................................................................... 9 THE COMMUNICATION THEORY OF HAROLD INNIS ........................................ 10 NEW MEDIA PUSH ON DEMOCRACY .................................................................... 13 Offering users the right to choose information freely ............................................... 13 Making free-thinking and free-speech available ....................................................... 14 Providing users more participatory rights ................................................................. 15 THE FUTURE OF DEMOCRACY IN THE CONTEXT OF NEW MEDIA ................ 16 PART 2 2008 IN RETROSPECT: FRAGILE CHINESE MEDIA UNDER THE SHADOW OF CHINA’S POLITICS ...........................................................................
    [Show full text]
  • Digital Neo-Colonialism: the Chinese Model of Internet Sovereignty in Africa
    AFRICAN HUMAN RIGHTS LAW JOURNAL To cite: W Gravett ‘Digital neo-colonialism: The Chinese model of internet sovereignty in Africa’ (2020) 20 African Human Rights Law Journal 125-146 http://dx.doi.org/10.17159/1996-2096/2020/v20n1a5 Digital neo-colonialism: The Chinese model of internet sovereignty in Africa Willem Gravett* Associate Professor, Faculty of Law, University of Pretoria, South Africa https://orcid.org/0000-0001-7400-0036 Summary: China is making a sustained effort to become a ‘cyber superpower’. An integral part of this effort is the propagation by Beijing of the notion of ‘internet sovereignty’ – China’s supreme right to govern the internet within its borders and keep it under rigid control. Chinese companies work closely with Chinese state authorities to export technology to Africa in order to extend China’s influence and promote its cyberspace governance model. This contribution argues that the rapid expansion across Africa of Chinese technology companies and their products warrants vigilance. If African governments fail to advance their own values and interests – including freedom of expression, free enterprise and the rule of law – with equal boldness, the ‘China model’ of digital governance by default might very well become the ‘Africa model’. Key words: Chinese internet censorship; data surveillance; digital authoritarianism; digital neo-colonialism; global cyber governance; internet sovereignty * BLC LLB (Pretoria) LLM (Notre Dame) LLD (Pretoria); [email protected]. I gratefully acknowledge the very able and
    [Show full text]
  • Effective Censorship: Maintaining Control in China
    University of Pennsylvania ScholarlyCommons CUREJ - College Undergraduate Research Electronic Journal College of Arts and Sciences 2010 Effective Censorship: Maintaining Control In China Michelle (Qian) Yang University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/curej Part of the Political Science Commons Recommended Citation Yang, Michelle (Qian), "Effective Censorship: Maintaining Control In China" 01 January 2010. CUREJ: College Undergraduate Research Electronic Journal, University of Pennsylvania, https://repository.upenn.edu/curej/118. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/curej/118 For more information, please contact [email protected]. Effective Censorship: Maintaining Control In China Keywords censorship, china, incentives, Social Sciences, Political Science, Devesh Kapur, Kapur, Devesh Disciplines Political Science This article is available at ScholarlyCommons: https://repository.upenn.edu/curej/118 Effective Censorship: Maintaining Control in China Michelle Yang April 09, 2010 Acknowledgments My initial interest in this thesis topic was generated during the summer of 2009 when I was interning in Beijing. There, I had found myself unable to access a large portion of the websites I’ve grown so accustomed to in my everyday life. I knew from then that I wanted to write about censorship in China. Since that summer, the scope of the topic has changed greatly under the careful guidance of Professor Devesh Kapur. I am incredibly grateful for all the support he has given me during this entire process. This final thesis wouldn’t be what it is today without his guidance. Professor Kapur, thank you for believing in me and for pushing me to complete this thesis! I would also like to extend my gratitude to both Professor Doherty-Sil and Professor Goldstein for taking time out of their busy schedules to meet with me and for providing me with indispensible advice.
    [Show full text]
  • How the Chinese Government Fabricates Social Media Posts
    American Political Science Review (2017) 111, 3, 484–501 doi:10.1017/S0003055417000144 c American Political Science Association 2017 How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, Not Engaged Argument GARY KING Harvard University JENNIFER PAN Stanford University MARGARET E. ROBERTS University of California, San Diego he Chinese government has long been suspected of hiring as many as 2 million people to surrep- titiously insert huge numbers of pseudonymous and other deceptive writings into the stream of T real social media posts, as if they were the genuine opinions of ordinary people. Many academics, and most journalists and activists, claim that these so-called 50c party posts vociferously argue for the government’s side in political and policy debates. As we show, this is also true of most posts openly accused on social media of being 50c. Yet almost no systematic empirical evidence exists for this claim https://doi.org/10.1017/S0003055417000144 . or, more importantly, for the Chinese regime’s strategic objective in pursuing this activity. In the first large-scale empirical analysis of this operation, we show how to identify the secretive authors of these posts, the posts written by them, and their content. We estimate that the government fabricates and posts about 448 million social media comments a year. In contrast to prior claims, we show that the Chinese regime’s strategy is to avoid arguing with skeptics of the party and the government, and to not even discuss controversial issues. We show that the goal of this massive secretive operation is instead to distract the public and change the subject, as most of these posts involve cheerleading for China, the revolutionary history of the Communist Party, or other symbols of the regime.
    [Show full text]
  • The Internet Beyond Borderless Versus Balkanized
    POROUS TERRITORIES: THE INTERNET BEYOND BORDERLESS VERSUS BALKANIZED LUKE MUNN Western Sydney University (Australia) [email protected] Abstract: If the internet was once viewed as a borderless realm, critics now warn it is in danger of being “balkanized”, splintering into nationalized fragments. Certainly nation-states increasingly see the Internet as “their” internet, a national space to be regulated and actively shaped. The first half of this article charts the technologies that appear to place this vision within reach: data localization, internet shutdowns, and internet filtering. These moves promise to exert sovereign control, to make the inter- net an extension of national territory. Yet by drawing on two recent events in China, this article argues that these territories are messy and their borders are permeable. Pro-government activists jump across the firewall in order to attack individuals and organizations who threaten the stability and security of their motherland. Simultane- ously, individuals scale the firewall in order to question the party line and express solidarity with democratic movements, undermining the political and technical boundaries established by their nation. Internet architectures create a condition where territorialization is constantly being both amplified and undermined by “extra- territorial” activities. These practices demonstrate the everyday porosity of internet territories, providing a messier portrait that goes beyond the dichotomy of borderless vs balkanized. Keywords: territory, fragmentation, balkanization, internet, China. When nations speak of the internet today, they no longer use the language of the virtual, but of soil. At the dawn of the internet, cyberspace was framed as a new realm decoupled from the state. This digital sphere stretched across the globe, making it essentially ungovernable.
    [Show full text]
  • Freedom on the Net 2016
    FREEDOM ON THE NET 2016 China 2015 2016 Population: 1.371 billion Not Not Internet Freedom Status Internet Penetration 2015 (ITU): 50 percent Free Free Social Media/ICT Apps Blocked: Yes Obstacles to Access (0-25) 18 18 Political/Social Content Blocked: Yes Limits on Content (0-35) 30 30 Bloggers/ICT Users Arrested: Yes Violations of User Rights (0-40) 40 40 TOTAL* (0-100) 88 88 Press Freedom 2016 Status: Not Free * 0=most free, 100=least free Key Developments: June 2015 – May 2016 • A draft cybersecurity law could step up requirements for internet companies to store data in China, censor information, and shut down services for security reasons, under the aus- pices of the Cyberspace Administration of China (see Legal Environment). • An antiterrorism law passed in December 2015 requires technology companies to cooperate with authorities to decrypt data, and introduced content restrictions that could suppress legitimate speech (see Content Removal and Surveillance, Privacy, and Anonymity). • A criminal law amendment effective since November 2015 introduced penalties of up to seven years in prison for posting misinformation on social media (see Legal Environment). • Real-name registration requirements were tightened for internet users, with unregistered mobile phone accounts closed in September 2015, and app providers instructed to regis- ter and store user data in 2016 (see Surveillance, Privacy, and Anonymity). • Websites operated by the South China Morning Post, The Economist and Time magazine were among those newly blocked for reporting perceived as critical of President Xi Jin- ping (see Blocking and Filtering). www.freedomonthenet.org FREEDOM CHINA ON THE NET 2016 Introduction China was the world’s worst abuser of internet freedom in the 2016 Freedom on the Net survey for the second consecutive year.
    [Show full text]
  • Redalyc.Characterizing E-Government in China
    Desafíos ISSN: 0124-4035 [email protected] Universidad del Rosario Colombia Baquero-Hernández, Ricardo Alberto Characterizing E-Government in China Desafíos, vol. 24, núm. 2, julio-diciembre, 2012, pp. 233-257 Universidad del Rosario Bogotá, Colombia Disponible en: http://www.redalyc.org/articulo.oa?id=359633172009 Cómo citar el artículo Número completo Sistema de Información Científica Más información del artículo Red de Revistas Científicas de América Latina, el Caribe, España y Portugal Página de la revista en redalyc.org Proyecto académico sin fines de lucro, desarrollado bajo la iniciativa de acceso abierto Characterizing E-Government in China RICARDO ALBERTO BAQUERO-HERNÁNDEZ* Artículo recibido: 10 de noviembre de 2010 Artículo aprobado: 12 de febrero de 2011 Para citar este artículo: Baquero Hernández, R. A. (2012). Characterizing E-Government in China. Desafíos, 24 (2), pp. 233-257. Abstract Although E-Government (E-G) is one public policy in China, it still has a long way to go in terms of diffusion across the country and interactive participation from citizens. It constitutes a double sided sword since it enhances the features that China needs to show to the world in international competitiveness and status, but also poses challenges to the Communist rule inasmuch as it has to be controlled. Therefore, E-G is both a political and a managerial issue: it is sensitive to the Chinese Communist Party but also leads to economical and administrative pros- perity and efficiency. Some of the keys would be the development of the middle class, further penetration of the Internet, and more education about virtual tools in government issues and services.
    [Show full text]
  • Redefining Digital Citizenship in the Cyber Era
    Cybersoverignty: Redefining Digital Citizenship in the Cyber Era By: Sophie Laurence AP Gov May 20, 2019 Cyber: a combining form meaning “computer,” “computer network,” or “virtual reality,” ​ used in the formation of compound words (cybertalk; cyberart; cyberspace) and, by extension, meaning “expressing visions of the future.” Sovereignty: supreme power especially over a body politic; freedom from external ​ control; autonomy. A search in dictionary.com yields the following result: “No results found for cybersovereignty.” Neither this word nor its variations (cyber-sovereignty, cyber sovereignty) appears in any English language dictionary. Yet, the rise of China as the world’s dominant cyber-superpower amplifies the urgent need for international discourse on its meaning and implications. Even as the West is wondering if a change in the global paradigm is underway, China has already dramatically redefined what it means to be a digital citizen in the 21st century. The working meaning of “cybersovereignty” is the full right and power of a governing body over the internet within its own borders, without any interference from outside entities. In the material world, national borders are physical boundaries protected by border guards, demarcated by country lines on maps, and governed by national laws. There is no equivalent universal system to regulate internet borders. Though utopianists routinely frame the internet as an open and free instrument of democracy, this is an ideological fiction; the reality is that the internet is a commodified entity owned by a privileged few and, in the case of China, state-controlled. Correspondingly, it has become a battleground in the struggle for international economic dominance and domestic political control.
    [Show full text]
  • Forbidden Feeds: Government Controls on Social Media in China
    FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and
    [Show full text]